Secure and Efficient Skyline Queries on Encrypted Data

by   Jinfei Liu, et al.

Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Furthermore, we demonstrate two optimizations, data partitioning and lazy merging, to further reduce the computation load. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions.


SecSkyline: Fast Privacy-Preserving Skyline Queries over Encrypted Cloud Databases

The well-known benefits of cloud computing have spurred the popularity o...

Secure Hypersphere Range Query on Encrypted Data

Spatial queries like range queries, nearest neighbor, circular range que...

Designing a Bit-Based Model to Accelerate Query Processing Over Encrypted Databases in Cloud

Database users have started moving toward the use of cloud computing as ...

AuthStore: Password-based Authentication and Encrypted Data Storage in Untrusted Environments

Passwords are widely used for client to server authentication as well as...

Secure Multilayer Perceptron Based On Homomorphic Encryption

In this work, we propose an outsourced Secure Multilayer Perceptron (SML...

Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection

Constrained shortest distance (CSD) querying is one of the fundamental g...

Dynamic Skyline Queries on Encrypted Data Using Result Materialization

Skyline computation is an increasingly popular query, with broad applica...

Please sign up or login with your details

Forgot password? Click here to reset